Monthly Archives: February, 2020

Dutch Withdraw 100 Phone Numbers Used for Fake Help Desks

The numbers were used by English-speaking fraudsters wanting to obtain remote access to their victims' computers.

KelniGVG ‘Gurus’ Take Ghanaian Regulators to Spain for ‘Training’

Ghana's government rejected claims that corruption was behind the appointment of KelniGVG as their national RA auditors.

Etisalat Buys Cybersecurity Business

The Arab telco group has bought Help AG, a security consultancy founded in Germany but which established offices in the Middle East during 2004.

Do Telcos Care if Huawei Spies on Customers?

The US government has told allies about backdoors in Huawei equipment, according to the Wall Street Journal. However, the CEO of Orange is less than impressed.

Wangiri Fraud: A Light at the End of the Tunnel

The recent wangiri attack upon Kenyans emphasizes the need for global cooperation to prevent wangiri fraud.

Honeypot Fake Infrastructure Catches Insider Fraud

If we use honeypots to lure and identify criminals working outside of telcos, why not use the same method to catch insiders?

Prison for Fraudsters Who Diverted Calls of 2,000 Customers

The criminal gang used the phone numbers and email addresses of BT customers to make luxury purchases with PayPal.

Subex CFO Proposes Major Capital Restructuring

Nominal share capital will be halved through a plan that will require shareholder and regulatory approval. Subex's growth is expected to top 7% and they are open to looking at acquisitions.

We Need You: Shredding Excuses for Staying at Home

Telco risk managers learn most from each other, but that means they must attend the same events. Here are five arguments to boost conference participation.

US Plans to Create Robocall-Tracing Monopoly

The TRACED Act demanded the appointment of a privately-led consortium tasked with tracing unlawful robocalls back to their origin.

Could AI Be Used to Stop Corruption?

Ukrainian business Sciforce believes machine learning has the potential to identify anomalies in unstructured data which are indicative of corrupt transactions.

Hackers Fool Telco Staff into Installing Remote Desktop Software, Claims Magazine

Persuading the unwary to allow remote access to their computers is an old trick, but it supposedly is used to execute SIM swaps.

Become a member

Get the best offers and updates relating to Liberty Case News.

Explore more

Read more

With each newly-published article, we explore more of what this planet has to offer us, and what we can offer it.